Mammary tumors (CMT) in dogs in Iraq may be induced by carcinogenic war ordnance. In our study, 10 virgin un- spayed military/pet bitches aged 5-15 years presented with abnormal masses in the abdomen with painful oedema, swelling, anorexia, weight loss, weakness and mild fever. Examination of regional lymph nodes and thoracic radiography confirmed metastasis. Tumors were excised and determined to be mostly adenocarcinomas involving multiple glands, solid in texture, 5-15 cm in size, mostly in the inguinal mammary glands at stage T3: >5 cm. Microscopy confirmed presence of adenocarcinoma in 8 dogs and solid carcinoma in 2 with half of tumors being grade III. Tumors had pleomorphic hyperchromatic cell nuclei in stroma, epithelial cells of duc
... Show MoreArtichoke (Cynara scolymus L.) is a nutritious vegetable that grown all over the world. It is a promising herbal plant, rich in bioactive components. It is considered as medicinal plant due to its nutritional and phytochemical composition, especially high proportion of phenolic compounds. The primary aim of this study was to achieve chemical profile analyses of artichoke for different phytochemcials, especially Scolymoside and Cynaroside. Methanolic crude was extracted from Artichoke leaves by rotary evaporator and separated by column chromatography. The fractions monitored by Thin Layer Chromatography (TLC), and identified in High-Pressure Liquid Chroma
... Show MoreChemical Methodologies (CHEMM)
This research investigates the type and the significant relationship between roaming management and self-efficacy and its impact on excellence in providing hotel service. To achieve this, the applied approach was adopted through A questionnaire was designed and developed for the collected data. It has consisted of three parts. The firsts section included nine questions to measure the dimensions of management by roaming. The second section includes nine questions to measure the effectiveness of the two employees. The last section includes 12 questions to measure the excellence of the hotel service. The research sample included 43 employees' responding to this
... Show MoreThe aim of the research is to use the data content analysis technique (DEA) in evaluating the efficiency of the performance of the eight branches of the General Tax Authority, located in Baghdad, represented by Karrada, Karkh parties, Karkh Center, Dora, Bayaa, Kadhimiya, New Baghdad, Rusafa according to the determination of the inputs represented by the number of non-accountable taxpayers and according to the categories professions and commercial business, deduction, transfer of property ownership, real estate and tenders, In addition to determining the outputs according to the checklist that contains nine dimensions to assess the efficiency of the performance of the investigated branches by investing their available resources T
... Show MoreThe Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key gene
... Show MoreMerging biometrics with cryptography has become more familiar and a great scientific field was born for researchers. Biometrics adds distinctive property to the security systems, due biometrics is unique and individual features for every person. In this study, a new method is presented for ciphering data based on fingerprint features. This research is done by addressing plaintext message based on positions of extracted minutiae from fingerprint into a generated random text file regardless the size of data. The proposed method can be explained in three scenarios. In the first scenario the message was used inside random text directly at positions of minutiae in the second scenario the message was encrypted with a choosen word before ciphering
... Show MoreThe research aims to identify the possibility of applying environmental fines to commercial shops and restaurants to reduce the environmental pollution represented by the wastes generated from them. The research sample was divided into two groups, including the first (20) commercial shops (meat shops and slaughter it, fruits & vegetables, legumes and accessories) and second (30) Restaurant in the city of Baghdad on both sides of Karkh and Rusafa. The quality of the waste was classified into carton, plastic, aluminum, glass, paper, cork and food waste. The study revealed the possibility of applying environmental fines to restaurants and shops to reduce the waste generated from them throughout the year and to apply continuous monitorin
... Show More